{"title":"利用个人计算机局域网络保护计算算法的系统实现","authors":"K. Kostromitin, B. N. Dokuchaev, D. A. Kozlov","doi":"10.1109/RusAutoCon52004.2021.9537530","DOIUrl":null,"url":null,"abstract":"An applied problem associated with the development of a comprehensive information protection system (computational algorithm) in a local computer network is to ensure information security of specific nodes of this network, information in which is of some value to their owner, due to its unknown to third parties, for example, information constituting trade secrets. In this case, a certain computational algorithm (computational function) acts as the protected information, with the help of which it is possible to perform a unique transformation of a specific input parameter, or data set, into an output value - the final result of the algorithm. At the same time, the input and output information, as well as information circulating outside the boundaries of the algorithm, is of no value to the user of this LAN, therefore, is not subject to protection.","PeriodicalId":106150,"journal":{"name":"2021 International Russian Automation Conference (RusAutoCon)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Implementation of a System for Protecting a Computational Algorithm Using a Local Network of Personal Computers\",\"authors\":\"K. Kostromitin, B. N. Dokuchaev, D. A. Kozlov\",\"doi\":\"10.1109/RusAutoCon52004.2021.9537530\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An applied problem associated with the development of a comprehensive information protection system (computational algorithm) in a local computer network is to ensure information security of specific nodes of this network, information in which is of some value to their owner, due to its unknown to third parties, for example, information constituting trade secrets. In this case, a certain computational algorithm (computational function) acts as the protected information, with the help of which it is possible to perform a unique transformation of a specific input parameter, or data set, into an output value - the final result of the algorithm. At the same time, the input and output information, as well as information circulating outside the boundaries of the algorithm, is of no value to the user of this LAN, therefore, is not subject to protection.\",\"PeriodicalId\":106150,\"journal\":{\"name\":\"2021 International Russian Automation Conference (RusAutoCon)\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-09-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Russian Automation Conference (RusAutoCon)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/RusAutoCon52004.2021.9537530\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Russian Automation Conference (RusAutoCon)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RusAutoCon52004.2021.9537530","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Implementation of a System for Protecting a Computational Algorithm Using a Local Network of Personal Computers
An applied problem associated with the development of a comprehensive information protection system (computational algorithm) in a local computer network is to ensure information security of specific nodes of this network, information in which is of some value to their owner, due to its unknown to third parties, for example, information constituting trade secrets. In this case, a certain computational algorithm (computational function) acts as the protected information, with the help of which it is possible to perform a unique transformation of a specific input parameter, or data set, into an output value - the final result of the algorithm. At the same time, the input and output information, as well as information circulating outside the boundaries of the algorithm, is of no value to the user of this LAN, therefore, is not subject to protection.